-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

2011 Linux Auto Rooter Beta 1.0 Coded by CrosS

2011 Linux Auto Rooter Beta 1.0 Coded by CrosS

Jul 20, 2011
2011 Linux Auto Rooter Beta 1.0 Coded by CrosS Source Code : #!/usr/bin/perl #Coded By CrosS ( 2011 Linux Auto r00t3r ) print "###########################################################\n"; print "# (Beta 1.0 ) Auto rooter by CrosS #\n"; print "# Usage : #\n"; print "# perl $0 root => To root #\n"; print "# perl $0 del => Delete Exploit #\n"; print "# #\n"; print "# as R00TW0RM - Private Community is back #\n"; print "# so Releasing 2011 auto rooter =) #\n"; print "# in case of error mailto: mr.0x0day[AT]live.com #\n"; print "# #\n"; print "# Thanks to: r0073r and L0rd CrusAd3r #\n";...
WD TV Live Hub Compromised - Multiple Vulnerabilities Found By Dr. Alberto Fontanella

WD TV Live Hub Compromised - Multiple Vulnerabilities Found By Dr. Alberto Fontanella

Jul 20, 2011
WD TV Live Hub Compromised - Multiple Vulnerabilities Found By Dr. Alberto Fontanella Dr. Alberto Fontanella found on (Western Digital) WD TV Live Hub appliance with the last firmware installed (2.06.10) and 3 exploits to get admin password, deface appliance and get root shell: Author: Dr. Alberto Fontanella E-mail: itsicurezza<0x40>yahoo.it Web: www.fulgursec.com Vendor: Western Digital Vendor Web: www.wdc.com Version: WD TV Live Hub <= 2.06.10 (firmware) ALL VERSIONS Type: Appliance Issues: Storage Anonymous Access, Full Path Disclosure, Bypass Authentication Schema, Appliance Command Execution, DoS, OS , Command Execution, Root Shell ;-) * AF - Owning WD TV Live Hub FILE: AF-Owning_WD_TV_Live_Hub.pdf INFO: Paper that shows all issues found on WD TV Live Hub and how use it to get Root! * AF - PoC/Exploit WD TV Live Hub Get Admin Password FILE: AF-WD_TV_Live_Hub_password.sh INFO: Exploit (Bypass Authentication Schema) to Get Admin Password o...
Association Of American Feed Control Officials (AAFCO) Hacked by ZHC

Association Of American Feed Control Officials (AAFCO) Hacked by ZHC

Jul 20, 2011
Association Of American Feed Control Officials (AAFCO) Hacked by  ZHC The Offocial Website of Association Of American Feed Control Officials (AAFCO) Hacked By ZHC TOSHIRO & ZHC MONGOOSE - ZCompany Hacking Crew - [ZHC] . Hacked Domains are  http://www.aafco.org/ and http://www.petfood.aafco.org/  . The Deface pages contain some message related to Their Protest Regarding PALESTINE. Mirrors of Hack available at  http://www.zone-h.com/mirror/id/14445813 and http://www.zone-h.com/mirror/id/14445892
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
Anonplus.com (Anonymous Social Networking Site) Hacked by AKINCILAR

Anonplus.com (Anonymous Social Networking Site) Hacked by AKINCILAR

Jul 20, 2011
Anonplus.com (Anonymous Social Networking Site)  Hacked by AKINCILAR After several members of Anonymous were reportedly banned from Google+ , the hacker group has announced they will be building their own social network called Anonplus.com  . Today  Anonplus.com  Got defaced by AKINCILAR with page title " The Seal to Anonymous from AKINCILAR ". Message posted on site: We Are TURKIYE We Are AKINCILAR This logo suits you more..How dare you rise against to the World..Do you really think that you are Ottoman Empire?We thought you before that you cannot challenge with the world and we teach you cannot be socialNow all of you go to your doghouse..
FBI Raids Homes of Suspected Anonymous Hackers at New York

FBI Raids Homes of Suspected Anonymous Hackers at New York

Jul 20, 2011
FBI Raids Homes of Suspected Anonymous Hackers at New York The FBI executed search warrants at the New York homes of three suspected members of notorious hacking group Anonymous early Tuesday morning. More than 10 FBI agents arrived at the Baldwin. The agents spent an hour and 40 minutes at Jordan's house, other agents investigated a second Long Island, N.Y., home and one in Brooklyn. The targets of the FBI searches are all in their late teens to early 20s. Search warrants were part of an ongoing investigation into Anonymous, which claimed responsibility for attacks against a variety of websites including Visa and Mastercard. Anonymous is a loose collection of cybersavvy activists inspired by WikiLeaks and its flamboyant head Julian Assange to fight for " Internet freedom " along the way defacing websites, shutting down servers, and scrawling messages across screens web-wide.
LulzSec will release Murdoch email archive

LulzSec will release Murdoch email archive

Jul 20, 2011
LulzSec will release Murdoch email archive LulzSec behind a hack on The Sun's website claim to have extracted an email archive which they plan to release later on Tuesday. The Sun's website were redirected towards a fake story on the supposed death of Rupert Murdoch by infamous hacktivist collective LulzSec. The group also redirected visitors to the main News International website to the LulzSec Twitter account. Sabu leader of LulzSec said via Twitter that the group was sitting on emails of News International staffers that it planned to release. Sabu released email login details for former News International chief exec Rebekah Brooks, a central figure in the News of the World voicemail-hacking scandal. The hackers also posted the mobile phone numbers of three News International execs. This information seems to have come from an old database.
FBI arrests AT&T employee for leaking information to Anonymous

FBI arrests AT&T employee for leaking information to Anonymous

Jul 20, 2011
FBI arrests AT&T employee for leaking information to Anonymous The Tech Herald reported on information given to us by Ryan Cleary shortly before his arrest. AT&T insider who handed sensitive information and a bootable USB disk over to Anonymous. On Tuesday, the FBI arrested an AT&T employee connected to the leak, during a nationwide sweep targeting Anonymous. The public first learned of the AT&T files from a Torrent release by LulzSec. The documents were included in the group’s final release before they disappeared from the public eye. The release also marked the second major data leak under the AntiSec movement, which has targeted both government and private sector organizations since its founding. In addition to documents, the insider leak also included a bootable USB drive used by AT&T. while interviewing Cleary for a separate story, he bragged about the AT&T leak, and the fact an insider delivered the information and software to Anonymous. “ …a...
BackTrack 5 Release 1 will be available on 10th of August,2011

BackTrack 5 Release 1 will be available on 10th of August,2011

Jul 20, 2011
BackTrack 5 Release 1 will be available on 10th of August,2011 BackTrack 5 R1 (Release one) will be available for download on the 10th of August,2011. This will complete our first 3 month cycle since the last release. With over 100 bug fixes, numerous package updates and the addition of over 30 new tools and scripts.  BackTrack Crew  will have a pre-release event of BackTrack 5 R1 at the BlackHat / Defcon Conference a few days earlier.
Microsoft offers $250,000 reward for information of Rustock Botnet

Microsoft offers $250,000 reward for information of Rustock Botnet

Jul 18, 2011
Microsoft offers $250,000 reward for information of Rustock Botnet Microsoft is offering a $250,000 reward for providing information of Rustock botnet. The Rustock botnet is responsible for a great deal of cyber crime, spam (the botnet has capacity for 30 billion spam mails every day), dodgy pharmaceuticals, counterfeit stuff and pirated software. The size of the Rustock botnet has already been cut in half, but that still leaves it with hundreds of thousands of systems under its control. In order to bring down the entire botnet Microsoft is now turning to the legal system. Microsoft Declares " Today, we take our pursuit a step further. After publishing notices in two Russian newspapers last month to notify the Rustock operators of the civil lawsuit, we decided to augment our civil discovery efforts to identify those responsible for controlling the notorious Rustock botnet by issuing a monetary reward in the amount of $250,000 for new information that results in the identifi...
Expert Insights Articles Videos
Cybersecurity Resources